Dan Handley | 610e7e1 | 2018-03-01 18:44:00 +0000 | [diff] [blame] | 1 | Arm CPU Specific Build Macros |
Douglas Raillard | d7c21b7 | 2017-06-28 15:23:03 +0100 | [diff] [blame] | 2 | ============================= |
| 3 | |
| 4 | |
| 5 | .. section-numbering:: |
| 6 | :suffix: . |
| 7 | |
| 8 | .. contents:: |
| 9 | |
| 10 | This document describes the various build options present in the CPU specific |
| 11 | operations framework to enable errata workarounds and to enable optimizations |
| 12 | for a specific CPU on a platform. |
| 13 | |
Dimitris Papastamos | 446f7f1 | 2017-11-30 14:53:53 +0000 | [diff] [blame] | 14 | Security Vulnerability Workarounds |
| 15 | ---------------------------------- |
| 16 | |
Dan Handley | 610e7e1 | 2018-03-01 18:44:00 +0000 | [diff] [blame] | 17 | TF-A exports a series of build flags which control which security |
| 18 | vulnerability workarounds should be applied at runtime. |
Dimitris Papastamos | 446f7f1 | 2017-11-30 14:53:53 +0000 | [diff] [blame] | 19 | |
| 20 | - ``WORKAROUND_CVE_2017_5715``: Enables the security workaround for |
Dimitris Papastamos | 6d1f499 | 2018-03-28 12:06:40 +0100 | [diff] [blame] | 21 | `CVE-2017-5715`_. This flag can be set to 0 by the platform if none |
| 22 | of the PEs in the system need the workaround. Setting this flag to 0 provides |
| 23 | no performance benefit for non-affected platforms, it just helps to comply |
| 24 | with the recommendation in the spec regarding workaround discovery. |
| 25 | Defaults to 1. |
Dimitris Papastamos | 446f7f1 | 2017-11-30 14:53:53 +0000 | [diff] [blame] | 26 | |
Dimitris Papastamos | e6625ec | 2018-04-05 14:38:26 +0100 | [diff] [blame] | 27 | - ``WORKAROUND_CVE_2018_3639``: Enables the security workaround for |
| 28 | `CVE-2018-3639`_. Defaults to 1. The TF-A project recommends to keep |
| 29 | the default value of 1 even on platforms that are unaffected by |
| 30 | CVE-2018-3639, in order to comply with the recommendation in the spec |
| 31 | regarding workaround discovery. |
| 32 | |
Dimitris Papastamos | ba51d9e | 2018-05-16 11:36:14 +0100 | [diff] [blame] | 33 | - ``DYNAMIC_WORKAROUND_CVE_2018_3639``: Enables dynamic mitigation for |
| 34 | `CVE-2018-3639`_. This build option should be set to 1 if the target |
| 35 | platform contains at least 1 CPU that requires dynamic mitigation. |
| 36 | Defaults to 0. |
| 37 | |
Douglas Raillard | d7c21b7 | 2017-06-28 15:23:03 +0100 | [diff] [blame] | 38 | CPU Errata Workarounds |
| 39 | ---------------------- |
| 40 | |
Dan Handley | 610e7e1 | 2018-03-01 18:44:00 +0000 | [diff] [blame] | 41 | TF-A exports a series of build flags which control the errata workarounds that |
| 42 | are applied to each CPU by the reset handler. The errata details can be found |
| 43 | in the CPU specific errata documents published by Arm: |
Douglas Raillard | d7c21b7 | 2017-06-28 15:23:03 +0100 | [diff] [blame] | 44 | |
| 45 | - `Cortex-A53 MPCore Software Developers Errata Notice`_ |
| 46 | - `Cortex-A57 MPCore Software Developers Errata Notice`_ |
Eleanor Bonnici | c3b4ca1 | 2017-08-02 18:33:41 +0100 | [diff] [blame] | 47 | - `Cortex-A72 MPCore Software Developers Errata Notice`_ |
Douglas Raillard | d7c21b7 | 2017-06-28 15:23:03 +0100 | [diff] [blame] | 48 | |
| 49 | The errata workarounds are implemented for a particular revision or a set of |
| 50 | processor revisions. This is checked by the reset handler at runtime. Each |
| 51 | errata workaround is identified by its ``ID`` as specified in the processor's |
| 52 | errata notice document. The format of the define used to enable/disable the |
| 53 | errata workaround is ``ERRATA_<Processor name>_<ID>``, where the ``Processor name`` |
| 54 | is for example ``A57`` for the ``Cortex_A57`` CPU. |
| 55 | |
| 56 | Refer to the section *CPU errata status reporting* in |
Eleanor Bonnici | 0c9bd27 | 2017-08-02 16:35:04 +0100 | [diff] [blame] | 57 | `Firmware Design guide`_ for information on how to write errata workaround |
| 58 | functions. |
Douglas Raillard | d7c21b7 | 2017-06-28 15:23:03 +0100 | [diff] [blame] | 59 | |
| 60 | All workarounds are disabled by default. The platform is responsible for |
| 61 | enabling these workarounds according to its requirement by defining the |
| 62 | errata workaround build flags in the platform specific makefile. In case |
| 63 | these workarounds are enabled for the wrong CPU revision then the errata |
| 64 | workaround is not applied. In the DEBUG build, this is indicated by |
| 65 | printing a warning to the crash console. |
| 66 | |
| 67 | In the current implementation, a platform which has more than 1 variant |
| 68 | with different revisions of a processor has no runtime mechanism available |
| 69 | for it to specify which errata workarounds should be enabled or not. |
| 70 | |
John Tsichritzis | 4daa1de | 2018-07-23 09:11:59 +0100 | [diff] [blame] | 71 | The value of the build flags is 0 by default, that is, disabled. A value of 1 |
| 72 | will enable it. |
Douglas Raillard | d7c21b7 | 2017-06-28 15:23:03 +0100 | [diff] [blame] | 73 | |
John Tsichritzis | 4daa1de | 2018-07-23 09:11:59 +0100 | [diff] [blame] | 74 | For Cortex-A53, the following errata build flags are defined : |
Douglas Raillard | d7c21b7 | 2017-06-28 15:23:03 +0100 | [diff] [blame] | 75 | |
| 76 | - ``ERRATA_A53_826319``: This applies errata 826319 workaround to Cortex-A53 |
| 77 | CPU. This needs to be enabled only for revision <= r0p2 of the CPU. |
| 78 | |
Douglas Raillard | b52353a | 2017-07-17 14:14:52 +0100 | [diff] [blame] | 79 | - ``ERRATA_A53_835769``: This applies erratum 835769 workaround at compile and |
| 80 | link time to Cortex-A53 CPU. This needs to be enabled for some variants of |
| 81 | revision <= r0p4. This workaround can lead the linker to create ``*.stub`` |
| 82 | sections. |
| 83 | |
Douglas Raillard | d7c21b7 | 2017-06-28 15:23:03 +0100 | [diff] [blame] | 84 | - ``ERRATA_A53_836870``: This applies errata 836870 workaround to Cortex-A53 |
| 85 | CPU. This needs to be enabled only for revision <= r0p3 of the CPU. From |
| 86 | r0p4 and onwards, this errata is enabled by default in hardware. |
| 87 | |
Douglas Raillard | b52353a | 2017-07-17 14:14:52 +0100 | [diff] [blame] | 88 | - ``ERRATA_A53_843419``: This applies erratum 843419 workaround at link time |
| 89 | to Cortex-A53 CPU. This needs to be enabled for some variants of revision |
| 90 | <= r0p4. This workaround can lead the linker to emit ``*.stub`` sections |
| 91 | which are 4kB aligned. |
| 92 | |
Douglas Raillard | d7c21b7 | 2017-06-28 15:23:03 +0100 | [diff] [blame] | 93 | - ``ERRATA_A53_855873``: This applies errata 855873 workaround to Cortex-A53 |
| 94 | CPUs. Though the erratum is present in every revision of the CPU, |
| 95 | this workaround is only applied to CPUs from r0p3 onwards, which feature |
| 96 | a chicken bit in CPUACTLR\_EL1 to enable a hardware workaround. |
| 97 | Earlier revisions of the CPU have other errata which require the same |
| 98 | workaround in software, so they should be covered anyway. |
| 99 | |
John Tsichritzis | 4daa1de | 2018-07-23 09:11:59 +0100 | [diff] [blame] | 100 | For Cortex-A57, the following errata build flags are defined : |
Douglas Raillard | d7c21b7 | 2017-06-28 15:23:03 +0100 | [diff] [blame] | 101 | |
| 102 | - ``ERRATA_A57_806969``: This applies errata 806969 workaround to Cortex-A57 |
| 103 | CPU. This needs to be enabled only for revision r0p0 of the CPU. |
| 104 | |
| 105 | - ``ERRATA_A57_813419``: This applies errata 813419 workaround to Cortex-A57 |
| 106 | CPU. This needs to be enabled only for revision r0p0 of the CPU. |
| 107 | |
| 108 | - ``ERRATA_A57_813420``: This applies errata 813420 workaround to Cortex-A57 |
| 109 | CPU. This needs to be enabled only for revision r0p0 of the CPU. |
| 110 | |
| 111 | - ``ERRATA_A57_826974``: This applies errata 826974 workaround to Cortex-A57 |
| 112 | CPU. This needs to be enabled only for revision <= r1p1 of the CPU. |
| 113 | |
| 114 | - ``ERRATA_A57_826977``: This applies errata 826977 workaround to Cortex-A57 |
| 115 | CPU. This needs to be enabled only for revision <= r1p1 of the CPU. |
| 116 | |
| 117 | - ``ERRATA_A57_828024``: This applies errata 828024 workaround to Cortex-A57 |
| 118 | CPU. This needs to be enabled only for revision <= r1p1 of the CPU. |
| 119 | |
| 120 | - ``ERRATA_A57_829520``: This applies errata 829520 workaround to Cortex-A57 |
| 121 | CPU. This needs to be enabled only for revision <= r1p2 of the CPU. |
| 122 | |
| 123 | - ``ERRATA_A57_833471``: This applies errata 833471 workaround to Cortex-A57 |
| 124 | CPU. This needs to be enabled only for revision <= r1p2 of the CPU. |
| 125 | |
Eleanor Bonnici | 0c9bd27 | 2017-08-02 16:35:04 +0100 | [diff] [blame] | 126 | - ``ERRATA_A57_859972``: This applies errata 859972 workaround to Cortex-A57 |
| 127 | CPU. This needs to be enabled only for revision <= r1p3 of the CPU. |
| 128 | |
Eleanor Bonnici | c3b4ca1 | 2017-08-02 18:33:41 +0100 | [diff] [blame] | 129 | |
John Tsichritzis | 4daa1de | 2018-07-23 09:11:59 +0100 | [diff] [blame] | 130 | For Cortex-A72, the following errata build flags are defined : |
Eleanor Bonnici | c3b4ca1 | 2017-08-02 18:33:41 +0100 | [diff] [blame] | 131 | |
| 132 | - ``ERRATA_A72_859971``: This applies errata 859971 workaround to Cortex-A72 |
| 133 | CPU. This needs to be enabled only for revision <= r0p3 of the CPU. |
| 134 | |
John Tsichritzis | 4daa1de | 2018-07-23 09:11:59 +0100 | [diff] [blame] | 135 | DSU Errata Workarounds |
| 136 | ---------------------- |
| 137 | |
| 138 | Similar to CPU errata, TF-A also implements workarounds for DSU (DynamIQ |
| 139 | Shared Unit) errata. The DSU errata details can be found in the respective Arm |
| 140 | documentation: |
| 141 | |
| 142 | - `Arm DSU Software Developers Errata Notice`_. |
| 143 | |
| 144 | Each erratum is identified by an ``ID``, as defined in the DSU errata notice |
| 145 | document. Thus, the build flags which enable/disable the errata workarounds |
| 146 | have the format ``ERRATA_DSU_<ID>``. The implementation and application logic |
| 147 | of DSU errata workarounds are similar to `CPU errata workarounds`_. |
| 148 | |
| 149 | For DSU errata, the following build flags are defined: |
| 150 | |
| 151 | - ``ERRATA_DSU_936184``: This applies errata 936184 workaround for the |
| 152 | affected DSU configurations. This errata applies only for those DSUs that |
| 153 | contain the ACP interface **and** the DSU revision is older than r2p0 (on |
| 154 | r2p0 it is fixed). However, please note that this workaround results in |
| 155 | increased DSU power consumption on idle. |
| 156 | |
Douglas Raillard | d7c21b7 | 2017-06-28 15:23:03 +0100 | [diff] [blame] | 157 | CPU Specific optimizations |
| 158 | -------------------------- |
| 159 | |
| 160 | This section describes some of the optimizations allowed by the CPU micro |
| 161 | architecture that can be enabled by the platform as desired. |
| 162 | |
| 163 | - ``SKIP_A57_L1_FLUSH_PWR_DWN``: This flag enables an optimization in the |
| 164 | Cortex-A57 cluster power down sequence by not flushing the Level 1 data |
| 165 | cache. The L1 data cache and the L2 unified cache are inclusive. A flush |
| 166 | of the L2 by set/way flushes any dirty lines from the L1 as well. This |
| 167 | is a known safe deviation from the Cortex-A57 TRM defined power down |
| 168 | sequence. Each Cortex-A57 based platform must make its own decision on |
| 169 | whether to use the optimization. |
| 170 | |
| 171 | - ``A53_DISABLE_NON_TEMPORAL_HINT``: This flag disables the cache non-temporal |
| 172 | hint. The LDNP/STNP instructions as implemented on Cortex-A53 do not behave |
| 173 | in a way most programmers expect, and will most probably result in a |
Dan Handley | 610e7e1 | 2018-03-01 18:44:00 +0000 | [diff] [blame] | 174 | significant speed degradation to any code that employs them. The Armv8-A |
| 175 | architecture (see Arm DDI 0487A.h, section D3.4.3) allows cores to ignore |
Douglas Raillard | d7c21b7 | 2017-06-28 15:23:03 +0100 | [diff] [blame] | 176 | the non-temporal hint and treat LDNP/STNP as LDP/STP instead. Enabling this |
| 177 | flag enforces this behaviour. This needs to be enabled only for revisions |
| 178 | <= r0p3 of the CPU and is enabled by default. |
| 179 | |
| 180 | - ``A57_DISABLE_NON_TEMPORAL_HINT``: This flag has the same behaviour as |
| 181 | ``A53_DISABLE_NON_TEMPORAL_HINT`` but for Cortex-A57. This needs to be |
| 182 | enabled only for revisions <= r1p2 of the CPU and is enabled by default, |
| 183 | as recommended in section "4.7 Non-Temporal Loads/Stores" of the |
| 184 | `Cortex-A57 Software Optimization Guide`_. |
| 185 | |
| 186 | -------------- |
| 187 | |
Dan Handley | 610e7e1 | 2018-03-01 18:44:00 +0000 | [diff] [blame] | 188 | *Copyright (c) 2014-2018, Arm Limited and Contributors. All rights reserved.* |
Douglas Raillard | d7c21b7 | 2017-06-28 15:23:03 +0100 | [diff] [blame] | 189 | |
John Tsichritzis | 3eeac41 | 2018-09-04 10:56:53 +0100 | [diff] [blame] | 190 | .. _CVE-2017-5715: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715 |
| 191 | .. _CVE-2018-3639: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3639 |
Eleanor Bonnici | 0c9bd27 | 2017-08-02 16:35:04 +0100 | [diff] [blame] | 192 | .. _Cortex-A53 MPCore Software Developers Errata Notice: http://infocenter.arm.com/help/topic/com.arm.doc.epm048406/Cortex_A53_MPCore_Software_Developers_Errata_Notice.pdf |
Douglas Raillard | d7c21b7 | 2017-06-28 15:23:03 +0100 | [diff] [blame] | 193 | .. _Cortex-A57 MPCore Software Developers Errata Notice: http://infocenter.arm.com/help/topic/com.arm.doc.epm049219/cortex_a57_mpcore_software_developers_errata_notice.pdf |
Eleanor Bonnici | c3b4ca1 | 2017-08-02 18:33:41 +0100 | [diff] [blame] | 194 | .. _Cortex-A72 MPCore Software Developers Errata Notice: http://infocenter.arm.com/help/topic/com.arm.doc.epm012079/index.html |
Douglas Raillard | d7c21b7 | 2017-06-28 15:23:03 +0100 | [diff] [blame] | 195 | .. _Firmware Design guide: firmware-design.rst |
| 196 | .. _Cortex-A57 Software Optimization Guide: http://infocenter.arm.com/help/topic/com.arm.doc.uan0015b/Cortex_A57_Software_Optimization_Guide_external.pdf |
John Tsichritzis | 4daa1de | 2018-07-23 09:11:59 +0100 | [diff] [blame] | 197 | .. _Arm DSU Software Developers Errata Notice: http://infocenter.arm.com/help/topic/com.arm.doc.epm138168/index.html |